Download Now Free registration required
This whitepaper describes how security professionals can reduce risks of vulnerabilities to portable applications and USB storage. It surveys the current state of USB storage and explains architectural background on the operation of portable applications. The paper also provides several examples of attacks using USB drives that exploit endpoints. It concludes by noting how Check Point Endpoint Security can block risks to an enterprise such as information leakage and attacks using USB and portable applications.
- Format: PDF
- Size: 788.34 KB